Fix a small typo in a comment and pretty it up a bit.
[Samba/gebeck_regimport.git] / source3 / libads / kerberos.c
blobbef2febaefd10d3bc2998332195ea0fe387e70ae
1 /*
2 Unix SMB/CIFS implementation.
3 kerberos utility library
4 Copyright (C) Andrew Tridgell 2001
5 Copyright (C) Remus Koos 2001
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 #include "includes.h"
25 #ifdef HAVE_KRB5
28 we use a prompter to avoid a crash bug in the kerberos libs when
29 dealing with empty passwords
30 this prompter is just a string copy ...
32 static krb5_error_code
33 kerb_prompter(krb5_context ctx, void *data,
34 const char *name,
35 const char *banner,
36 int num_prompts,
37 krb5_prompt prompts[])
39 if (num_prompts == 0) return 0;
41 memset(prompts[0].reply->data, 0, prompts[0].reply->length);
42 if (prompts[0].reply->length > 0) {
43 if (data) {
44 strncpy(prompts[0].reply->data, data, prompts[0].reply->length-1);
45 prompts[0].reply->length = strlen(prompts[0].reply->data);
46 } else {
47 prompts[0].reply->length = 0;
50 return 0;
54 simulate a kinit, putting the tgt in the default cache location
55 remus@snapserver.com
57 int kerberos_kinit_password(const char *principal, const char *password, int time_offset)
59 krb5_context ctx;
60 krb5_error_code code = 0;
61 krb5_ccache cc;
62 krb5_principal me;
63 krb5_creds my_creds;
65 if ((code = krb5_init_context(&ctx)))
66 return code;
68 if (time_offset != 0) {
69 krb5_set_real_time(ctx, time(NULL) + time_offset, 0);
72 if ((code = krb5_cc_default(ctx, &cc))) {
73 krb5_free_context(ctx);
74 return code;
77 if ((code = krb5_parse_name(ctx, principal, &me))) {
78 krb5_free_context(ctx);
79 return code;
82 if ((code = krb5_get_init_creds_password(ctx, &my_creds, me, NULL,
83 kerb_prompter,
84 password, 0, NULL, NULL))) {
85 krb5_free_principal(ctx, me);
86 krb5_free_context(ctx);
87 return code;
90 if ((code = krb5_cc_initialize(ctx, cc, me))) {
91 krb5_free_cred_contents(ctx, &my_creds);
92 krb5_free_principal(ctx, me);
93 krb5_free_context(ctx);
94 return code;
97 if ((code = krb5_cc_store_cred(ctx, cc, &my_creds))) {
98 krb5_cc_close(ctx, cc);
99 krb5_free_cred_contents(ctx, &my_creds);
100 krb5_free_principal(ctx, me);
101 krb5_free_context(ctx);
102 return code;
105 krb5_cc_close(ctx, cc);
106 krb5_free_cred_contents(ctx, &my_creds);
107 krb5_free_principal(ctx, me);
108 krb5_free_context(ctx);
110 return 0;
115 /* run kinit to setup our ccache */
116 int ads_kinit_password(ADS_STRUCT *ads)
118 char *s;
119 int ret;
121 if (asprintf(&s, "%s@%s", ads->auth.user_name, ads->auth.realm) == -1) {
122 return KRB5_CC_NOMEM;
125 if (!ads->auth.password) {
126 return KRB5_LIBOS_CANTREADPWD;
129 ret = kerberos_kinit_password(s, ads->auth.password, ads->auth.time_offset);
131 if (ret) {
132 DEBUG(0,("kerberos_kinit_password %s failed: %s\n",
133 s, error_message(ret)));
135 free(s);
136 return ret;
140 #endif